VMware Security Advisory
Advisory ID: VMSA-2016-0023
Synopsis: VMware ESXi updates address a cross-site
Issue date: 2016-12-20
Updated on: 2016-12-20 (Initial Advisory)
CVE number: CVE-2016-7463
VMware ESXi updates address a cross-site scripting issue.
2. Relevant Releases
VMware vSphere Hypervisor (ESXi)
3. Problem Description
a. Host Client stored cross-site scripting issue
The ESXi Host Client contains a vulnerability that may allow for
stored cross-site scripting (XSS). The issue can be introduced by
an attacker that has permission to manage virtual machines through
ESXi Host Client or by tricking the vSphere administrator to import
a specially crafted VM. The issue may be triggered on the system
from where ESXi Host Client is used to manage the specially crafted
VMware advises not to import VMs from untrusted sources.
VMware would like to thank Caleb Watt (@calebwatt15) for reporting
this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the identifier CVE-2016-7463 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
VMware Product Running Replace with/
Product Version on Severity Apply Patch* Workaround
======= ======= ======= ======== ============= ==========
ESXi 6.5 ESXi N/A not affected N/A
ESXi 6.0 ESXi Important ESXi600-201611102-SG None
ESXi 5.5 ESXi Important ESXi550-201612102-SG None
*The fling version which resolves this issue is 1.13.0.
Please review the patch/release notes for your product and
version and verify the checksum of your downloaded file.
6. Change log
Initial security advisory in conjunction with the release of VMware
ESXi 5.5 patches on 2016-12-20.
Created on December 20, 2016 by Rick Scherer
Posted under Alert.
This blog has 1,572 views.